US8914481B2 - Spontaneous resource management - Google Patents

Spontaneous resource management Download PDF

Info

Publication number
US8914481B2
US8914481B2 US12/258,181 US25818108A US8914481B2 US 8914481 B2 US8914481 B2 US 8914481B2 US 25818108 A US25818108 A US 25818108A US 8914481 B2 US8914481 B2 US 8914481B2
Authority
US
United States
Prior art keywords
managed
services
service
repository
search
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US12/258,181
Other versions
US20100106834A1 (en
Inventor
Scott Alan Isaacson
Stephen R Carter
Tammy Anita Green
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Micro Focus Software Inc
JPMorgan Chase Bank NA
Original Assignee
Novell Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Novell Inc filed Critical Novell Inc
Priority to US12/258,181 priority Critical patent/US8914481B2/en
Assigned to NOVELL, INC. reassignment NOVELL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CARTER, STEPHEN R, GREEN, TAMMY ANITA, ISAACSON, SCOTT ALAN
Publication of US20100106834A1 publication Critical patent/US20100106834A1/en
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH GRANT OF PATENT SECURITY INTEREST Assignors: NOVELL, INC.
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH GRANT OF PATENT SECURITY INTEREST (SECOND LIEN) Assignors: NOVELL, INC.
Assigned to NOVELL, INC. reassignment NOVELL, INC. RELEASE OF SECURITY INTEREST IN PATENTS FIRST LIEN (RELEASES RF 026270/0001 AND 027289/0727) Assignors: CREDIT SUISSE AG, AS COLLATERAL AGENT
Assigned to NOVELL, INC. reassignment NOVELL, INC. RELEASE OF SECURITY IN PATENTS SECOND LIEN (RELEASES RF 026275/0018 AND 027290/0983) Assignors: CREDIT SUISSE AG, AS COLLATERAL AGENT
Assigned to CREDIT SUISSE AG, AS COLLATERAL AGENT reassignment CREDIT SUISSE AG, AS COLLATERAL AGENT GRANT OF PATENT SECURITY INTEREST FIRST LIEN Assignors: NOVELL, INC.
Assigned to CREDIT SUISSE AG, AS COLLATERAL AGENT reassignment CREDIT SUISSE AG, AS COLLATERAL AGENT GRANT OF PATENT SECURITY INTEREST SECOND LIEN Assignors: NOVELL, INC.
Assigned to NOVELL, INC. reassignment NOVELL, INC. RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0216 Assignors: CREDIT SUISSE AG
Assigned to NOVELL, INC. reassignment NOVELL, INC. RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0316 Assignors: CREDIT SUISSE AG
Publication of US8914481B2 publication Critical patent/US8914481B2/en
Application granted granted Critical
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ATTACHMATE CORPORATION, BORLAND SOFTWARE CORPORATION, MICRO FOCUS (US), INC., NETIQ CORPORATION, NOVELL, INC.
Assigned to MICRO FOCUS SOFTWARE INC. reassignment MICRO FOCUS SOFTWARE INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: NOVELL, INC.
Assigned to JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT reassignment JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT NOTICE OF SUCCESSION OF AGENCY Assignors: BANK OF AMERICA, N.A., AS PRIOR AGENT
Assigned to JPMORGAN CHASE BANK, N.A. reassignment JPMORGAN CHASE BANK, N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ARCSIGHT, LLC, ATTACHMATE CORPORATION, BORLAND SOFTWARE CORPORATION, ENTIT SOFTWARE LLC, MICRO FOCUS (US), INC., MICRO FOCUS SOFTWARE, INC., NETIQ CORPORATION, SERENA SOFTWARE, INC.
Assigned to JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT reassignment JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT CORRECTIVE ASSIGNMENT TO CORRECT THE TO CORRECT TYPO IN APPLICATION NUMBER 10708121 WHICH SHOULD BE 10708021 PREVIOUSLY RECORDED ON REEL 042388 FRAME 0386. ASSIGNOR(S) HEREBY CONFIRMS THE NOTICE OF SUCCESSION OF AGENCY. Assignors: BANK OF AMERICA, N.A., AS PRIOR AGENT
Assigned to NETIQ CORPORATION, MICRO FOCUS (US), INC., MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), ATTACHMATE CORPORATION, BORLAND SOFTWARE CORPORATION reassignment NETIQ CORPORATION RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251 Assignors: JPMORGAN CHASE BANK, N.A.
Assigned to NETIQ CORPORATION, ATTACHMATE CORPORATION, MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), MICRO FOCUS (US), INC., SERENA SOFTWARE, INC, MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), BORLAND SOFTWARE CORPORATION reassignment NETIQ CORPORATION RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718 Assignors: JPMORGAN CHASE BANK, N.A.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements

Definitions

  • the managed systems are often discrete and are capable of acting in concert with other services for providing higher-level composite services. Also, these systems are of various hardware architectures and operating systems, which operate within heterogeneous environments and which offer individual services on presumably the most efficient, reliable, or cost effective architectural platforms.
  • an organization's managed system may often include many isolated data centers and workgroup productivity centers deployed as duplicate and redundant servers and services. This is done by the enterprise, without really knowing what is already available.
  • a new server needs to be deployed having a certain version of an operating system, which supports a unique application and that can only run on a particular device; but, again, the application acts in a coordinated manner with other services that are deployed within the organization.
  • n-tier systems are well understood within the industry, but require real systems to deploy them.
  • the fastest performing web server is an Apache running on an openSUSE Linux server
  • the best authentication server is Novell eDirectory® running on a NetWare® 6.5 server
  • the best middle tier application server is some custom application running on Novell SLES 10
  • the database server is an Oracle® database running on Solaris® on a Sun® server.
  • processors are IA32 or IA64 and some are SPARC®.
  • Some Operating Systems (OS's) are closed source and proprietary, while some are open source.
  • a certain department within the organization decides to deploy these servers and services, but they must be maintained and supported and so the organization hires a variety of qualified staff to monitor these servers and services.
  • the hired systems managers often use proprietary, open source, and open standards-based tools such as OpenView, DMTF CIMOM, SNMP, iManager, YaST, command line tools, scripts, and/or other tools to monitor and manage the servers and services.
  • a method for dynamic resource management is provided. More specifically, and in an embodiment, a method is provided for dynamic resource management. Broadcast messages are regularly received from managed services of an enterprise over a network. The broadcast messages are indexed in a repository. A management tool subsequently permits searches to be executed against the repository for purposes of selectively identifying particular ones of the managed services that collectively form a managed group of services that the management tool dynamically manages.
  • FIG. 1 is a diagram of a method for dynamic resource management, according to an example embodiment.
  • FIG. 2 is a diagram of another method for spontaneous resource management, according to an example embodiment.
  • FIG. 3 is a diagram of spontaneous resource management system, according to an example embodiment.
  • FIG. 4 is a diagram of another spontaneous resource management system according to an example embodiment.
  • a “resource” includes a user, content, a processing device, a node, a service, an application, a system, a directory, a data store, groups of users, combinations of these things, etc. Resources can interact with each other and can either act on other resource or be acted upon by other resources.
  • the term “service” and “application” may be used interchangeably herein and refer to a type of software resource that includes instructions, which when executed by a machine performs operations that change the state of the machine and that may produce output.
  • a resource is recognized via an “identity.”
  • An identity is authenticated via various techniques (e.g., challenge and response interaction, cookies, assertions, etc.) that use various identifying information (e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.).
  • identifying information e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.
  • a “true identity” is one that is unique to a resource across any context that the resource may engage in over a network (e.g., Internet, Intranet, etc.).
  • each resource may have and manage a variety of identities, where each of these identities may only be unique within a given context (given service interaction, given processing environment, given virtual processing environment, etc.).
  • managed resource may be used interchangeably and synonymously herein and below.
  • These are special resources that are managed and monitored by a network administrator. These can include such things as servers, proxies, storage devices, email services, etc.
  • the resources that are managed are dispersed over a network, such as the Internet and/or an enterprise Intranet, etc.
  • the managed resources are dynamic such that they change and evolve in real time as conditions change with them on the network.
  • the resources self-populate dynamically defined managed resource groups and add and remove themselves from groups as circumstances warrant.
  • Various embodiments of this invention can be implemented in existing network architectures, security systems, data centers, and/or communication devices.
  • the techniques presented herein are implemented in whole or in part in the Novell® network, proxy server products, email products, operating system products, data center products, and/or directory services products distributed by Novell®, Inc., of Provo, Utah.
  • FIG. 1 is a diagram of a method 100 for spontaneous resource management, according to an example embodiment.
  • the method 100 (hereinafter “information collection service”) is implemented as instructions in a machine-accessible and computer-readable storage medium. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in FIG. 1 .
  • the information collection service is also operational over and processes within a network.
  • the network may be wired, wireless, or a combination of wired and wireless.
  • the information collection service regularly receives broadcast messages from managed services or an enterprise over the network.
  • the broadcast messages can include a variety of information, such as standards being used with the managed services (Distributed Management Task Force (DMTF), Common Information Manager Object Model (CIMOM), Simple Network Management Protocol (SNMP), etc.).
  • DMTF Distributed Management Task Force
  • CIMOM Common Information Manager Object Model
  • SNMP Simple Network Management Protocol
  • the broadcast messages can also indicate who the managed services are and what they are doing. For example, I am IA32 Intel® 586 server that is loaded with openSUSE® 10.3 and I am running Apache 2.1.2 on ports 80 and 443 .
  • the information collection service receives the broadcast messages as part of a heartbeat message from servers that process the managed services.
  • the servers may periodically broadcast heartbeat messages indicating that they are up and running to the other remaining servers.
  • the broadcast messages can be part of that heartbeat message.
  • the information collection service collects the broadcast messages. In some cases, all the information that is advertised by the managed services is contained in the broadcast messages. In another case, at 112 , the information collection service periodically performs queries against the managed services and/or their processing environments to acquire additional information for each of the managed services. This additional information is also indexed within the repository with the broadcast messages (discussed below) and made available to the searches of a management tool (also discussed below).
  • the information collection service can be configured to inspect install logs and comments located in headers and source code associated with each of the managed services when the queries are performed. So, the information collection service targets specific files, directories, and/or metadata within the processing environments of the managed services to collect the additional information.
  • an entire file, document and/or comments from the processing environment or managed service are grabbed by the information collection service and no real query is performed at all; rather, the whole text version of these entities are used as the additional information.
  • free-form text as inputted by personnel associated with the managed services can be captured in its unadulterated format, such as a note from an administrative person that the person made to himself or herself, install read me files, etc.
  • the information captured by the information collection service can be viewed as similar to a blog or social networking site, but the information is related to a managed resource and not a person (as would be the case with a blog or social networking site).
  • the information is not modified and is retained by the information collection service.
  • the information collection service indexes the broadcast messages in a repository that is managed by the information collection service.
  • the information collection service uses a World-Wide Web (WWW) search engine, such as Google®, for performing the indexing within the repository.
  • WWW World-Wide Web
  • a management tool (discussed below) subsequently uses the search engine to perform a search of the repository (also discussed below).
  • the information collection service maintains the repository as one or more of the following: a file, a set of files, a directory, a set of directories, a relational database, a set of relational databases organized as a data warehouse, a dynamically maintained document, a set of dynamically maintained documents, an object, a set of objects, an object-oriented database, a set of object-oriented databases, and/or one or more hybrid databases.
  • the information collection service subsequently permits a management tool to search the repository for purposes of selectively identifying particular ones of the managed services to form a managed group of services that the management tool dynamically manages.
  • the management tool searches the repository that this provided and managed by the information collection service to identify particular managed resources. These managed resources are organized as a self-managed group and presented as a logical entity within the management tool for the management tool to monitor and manage.
  • the search can be custom defined, predefined, previously saved, ad hoc, etc.
  • members (services) of the managed group can dynamically change, such that new members are added and/or existing members are deleted from the managed group. This can occur via periodically executing the search.
  • the search is registered with the information collection service and when the information collection service detects an addition or deletion the management tool is automatically notified via a change in the membership of the managed group. So, members can chaotically change within the managed group.
  • the information collection service also returns a relevancy rating for each particular managed service. This is done when the management tool performs the search against the repository. The management tool can then selectively pick each member of the managed group in response to the relevancy rating. For example, consider a search of the repository that uses Google®, a percentage for relevancy can be automatically provided. Policies can also be used such that when a relevancy rating exceeds a threshold value (e.g., 80%) the managed service associated with the result is automatically added to the managed group.
  • a threshold value e.g., 80%
  • the search can result in automatic managed group population or can result in a semi or partially populated group that can be completely populated by an administrator that interacts with the management tool and views the results from the search.
  • the information that is stored in the repository is associated with particular managed services.
  • the answer set returned with the search can include links to the full content associated with a match in its native location on a particular managed service or in a copy of the full content maintained within the repository.
  • FIG. 2 is a diagram of another method 200 for spontaneous resource management, according to an example embodiment.
  • the method 200 (hereinafter “resource manager” is implemented in a machine-accessible and readable medium as instructions. The instructions when executed by a machine perform the processing depicted in the FIG. 2 .
  • the resource manager is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
  • the resource manager presents a perspective of dynamic resource management from an administrator's client device whereas the information collection service (represented by the method 100 of the FIG. 1 ) presented the perspective of a repository that dynamically collects information about managed resources. So, the resource manager interacts with the information collection service to dynamically define and manage resources.
  • the resource manager receives search criteria (custom, ad hoc, previously saved, etc.).
  • the search criteria define a dynamic group of services that are to assemble or to be assembled and managed/monitored on the network.
  • the resource manager receives the search criteria as free form text that is entered into a search bar of a management tool interface by a network administrator.
  • the resource manager is the management tool and provides the search bar or menu option to the network administrator.
  • the search criteria can be entered as a Structured Query Language (SQL) format by the network administrator.
  • SQL Structured Query Language
  • the resource manager permits a network administrator to browse an index of information associated with network services for purposes of interactively defining the search criteria.
  • the resource manager acquires a hierarchy of information from a self-organizing server.
  • the hierarchy is presented to the network administrator and the network administrator can navigate and interact with the hierarchy for purposes of defining the search criteria. So, different views of the information about the networked services can be maintained at the self-organizing server and the network administrator can navigate and view that information via categories, topics, classifications, etc.
  • the resource manager submits the search criteria to a self-organizing server over the network.
  • Example processing associated with the self-organizing server was presented above with reference to the method 100 of the FIG. 1 .
  • the resource manager forms the dynamic group in response to an answer set that is returned from the self-organizing server that identifies each service as conforming to the search criteria. That is, the search defining the search criteria when executed by the self-organizing server reveals an answer set. That answer set includes the identities of particular managed services and those particular managed services form the dynamic group that is to be managed over the network.
  • the resource manager periodically re-submits the search criteria to the self-organizing server to dynamically update members of the dynamic group.
  • a policy may indicate how frequently the search is re-submitted.
  • this can be compared to the search criteria (via the self-organizing server) and the dynamic group of services automatically updated as needed.
  • the resource manager dynamically removes at least one service from the dynamic group in response to an updated answer set received from the self-organizing server.
  • the updated answer set excludes that particular service such that when compared to the previous answer set it is noted that the particular service is being dynamically removed.
  • the resource manager dynamically adds at least one new service from the dynamic group of services in response to an updated answer set received from the self-organizing server. Again, the updated answer set reveals an addition of the particular service when compared to the previous answer set.
  • the dynamic group is updated as conditions change on the network. So, should a particular service change its processing environment or configuration such that it is now not considered a member of the managed group in view of the defined search criteria, then the particular service is automatically and dynamically removed from the managed group.
  • a network administrator interacts with the resource manager to define some search criteria that is provided to the self-organizing server.
  • the search criteria define a new group or relationship between some managed servers/services.
  • the group is not a static one time effort, rather the group is an ongoing and dynamic grouping of servers or services that match the criteria, such that servers or services are regularly added or dropped from the group in real time and on-the-fly (as the changes occur within the network).
  • an administrator wants all servers that have Apache® or IIS and that are not configured with a firewall. The administrator points this query at the self-organizing server and watches to see if any servers pop up that meet the criteria and then he/she can take the appropriate management action.
  • Management tools are used to browse the index of or search the self-organizing server so as to see who is up and what is going on and to dynamically create and organize groups of servers/services based on current conditions, rather than based on some predefined and hardcoded structure in a management tool.
  • FIG. 3 is a diagram of spontaneous resource management system 300 , according to an example embodiment.
  • the spontaneous resource management system 300 is implemented in a machine-accessible and computer-readable storage medium as instructions.
  • the instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in the FIGS. 1 and 2 .
  • the spontaneous resource management system 300 is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
  • the spontaneous resource management system 300 includes a self-organizing server 301 and a management tool 302 . Each of these and their interactions with one another will now be discussed in turn.
  • the self-organizing server 301 is implemented in a computer-readable storage medium as instructions that process on server machine (computer or processor-enabled device). Example processing associated with the self-organizing server 301 was presented above with reference to the method 100 of the FIG. 1 .
  • the self-organizing server 301 collects information, which is associated with managed services or systems of an enterprise.
  • the self-organizing server 301 passively receives broadcast messages having the information.
  • the broadcast messages are broadcast by each of the managed services over the network.
  • the self-organizing server 301 actively scrapes metadata from the managed services to gather some of the information.
  • the self-organizing server 301 indexes the information in a repository. Also, the self-organizing server 301 permits the management tool 302 to use a WWW search engine to formulate and execute the search.
  • the management tool 302 is implemented in a computer-readable storage medium as instructions that process on a client machine (computer or processor-enabled device) of a network administrator. Example processing associated with the management tool 302 was presented in detail above with reference to the method 200 of the FIG. 2 .
  • the management tool 302 is used to search the information housed at the self-organizing server 301 for purposes of dynamically and selectively populating a managed group of the managed services or systems.
  • the management tool 302 presents an interactive interface to a network administrator for purposes of defining the search and to select and define the managed group.
  • the management tool 302 may permit a search to be defined or permit the search to be automatically built via browsing an index or hierarchy of information related to the managed services and maintained by the self-organizing server 301 .
  • FIG. 4 is a diagram of another spontaneous resource management system 400 according to an example embodiment.
  • the spontaneous resource management system 400 is implemented as instructions on or within a machine-accessible and computer-readable storage medium.
  • the instructions when executed by one or more machines (computer(s) or processor-enabled device(s)) perform various aspects of the processing depicted with respect to the methods 100 and 200 of the FIGS. 1 and 2 , respectively; and the system 300 of the FIG. 3 .
  • the spontaneous resource management system 400 is also operational over a network and the network may be wired, wireless, or a combination of wired and wireless.
  • the spontaneous resource management system 400 includes a collection of managed resources 401 and a repository 402 . Each of these components and their interactions with one another will now be discussed in turn.
  • Each resource of the collection of managed resources 401 is implemented in a computer-readable storage medium as instructions and is to be processed by a machine (computer or processor-enabled device) over the network.
  • Example aspects of the collection of managed resources 401 were presented above in detail with reference to the methods 100 and 200 of the FIGS. 1 and 2 , respectively, and with respect to the system 300 of the FIG. 3 .
  • the collection of managed resources 401 is dynamically defined via a search that is formulated via a management tool, such as the management tool 302 of the system 300 and depicted in FIG. 3 .
  • the collection of managed resources 401 is dynamically modified by deleting a member or by adding a new member when conditions related to the search warrant modification to the collection of managed resources 401 .
  • the collection of managed resources 401 is dynamically and in real time modified to remove that particular member.
  • the collection of managed resources 401 can be dynamically modified by adding a new member that adds information that conforms to the search.
  • the repository 402 is implemented in a computer-readable storage medium and is accessible to the managed resources and to other resources of the network. Some example aspects of the repository 402 were presented in detail above with reference to the methods 100 and 200 of the FIGS. 1 and 2 , respectively, and with respect to the system 300 of the FIG. 3 .
  • reach of the managed resources publish or advertise information that is captured in the repository.
  • the search matches the information in the repository.
  • the information is at least partially dynamically culled from each of the managed resources.
  • the information for each of the managed resources is indexed within the repository and compared against search criteria when the search is executed.

Abstract

Techniques for spontaneous resource management are provided. Information about resources is indexed and housed in a repository. The information is dynamically updated. Search queries are performed against the indexed information in the repository for purposes of forming dynamic groupings of the resources that are then managed as custom-defined and dynamic groups.

Description

BACKGROUND
Most business, educational, community, and government organizations rely on computer systems to support their business processes. These computer systems have to be deployed and managed by sizable support personnel. Additionally, many organizations require more than one computer system, which is often deployed as a suite and which generally acts in a coordinated manner to realize complex business processes and transactions. These distributed systems are contained within protected zones and bounded within firewalls and access points. But, within the protected zones there is often open communication and cooperation between various managed systems and the services that they host.
The managed systems are often discrete and are capable of acting in concert with other services for providing higher-level composite services. Also, these systems are of various hardware architectures and operating systems, which operate within heterogeneous environments and which offer individual services on presumably the most efficient, reliable, or cost effective architectural platforms.
However, there are few organizations that act/operate with one mind from the top down. Likewise, an organization's managed system may often include many isolated data centers and workgroup productivity centers deployed as duplicate and redundant servers and services. This is done by the enterprise, without really knowing what is already available. In some cases, a new server needs to be deployed having a certain version of an operating system, which supports a unique application and that can only run on a particular device; but, again, the application acts in a coordinated manner with other services that are deployed within the organization.
For example, take a real world scenario of a customer and partner-facing World-Wide Web (WWW) portal for a given enterprise. This would likely need the following components:
    • Web server(s)
    • Authentication server(s)
    • Middle-tier application server(s)
    • Database server(s)
    • And other such components.
These n-tier systems are well understood within the industry, but require real systems to deploy them. In this example, perhaps the fastest performing web server is an Apache running on an openSUSE Linux server, and the best authentication server is Novell eDirectory® running on a NetWare® 6.5 server and the best middle tier application server is some custom application running on Novell SLES 10 and the database server is an Oracle® database running on Solaris® on a Sun® server. Each of these servers is based on hardware that is different from the others in many respects. Some processors are IA32 or IA64 and some are SPARC®. Some Operating Systems (OS's) are closed source and proprietary, while some are open source. A certain department within the organization decides to deploy these servers and services, but they must be maintained and supported and so the organization hires a variety of qualified staff to monitor these servers and services. The hired systems managers often use proprietary, open source, and open standards-based tools such as OpenView, DMTF CIMOM, SNMP, iManager, YaST, command line tools, scripts, and/or other tools to monitor and manage the servers and services.
Problems arise when not just one department within an enterprise deploys these various servers and services, but when multiple departments within the same enterprise do the same thing as one another. When this happens, there are two web servers, two database servers, two authentication services. Many solutions exist today to synchronize data between these systems, but a problem still remains when multiple Information Technology (IT) staff and resources are assigned to manage servers and services that perhaps should and probably could be consolidated together.
Another issue is when a systems manager locates various servers and services (IP address, LAN subnet, URL, port, or other location/identification mechanism) and then groups them into management groups that make sense to that system administrator, but perhaps does not make sense to another systems administrator from another department.
Thus, improved techniques for system management are needed.
SUMMARY
In various embodiments, techniques for spontaneous resource management are provided. More specifically, and in an embodiment, a method is provided for dynamic resource management. Broadcast messages are regularly received from managed services of an enterprise over a network. The broadcast messages are indexed in a repository. A management tool subsequently permits searches to be executed against the repository for purposes of selectively identifying particular ones of the managed services that collectively form a managed group of services that the management tool dynamically manages.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram of a method for dynamic resource management, according to an example embodiment.
FIG. 2 is a diagram of another method for spontaneous resource management, according to an example embodiment.
FIG. 3 is a diagram of spontaneous resource management system, according to an example embodiment.
FIG. 4 is a diagram of another spontaneous resource management system according to an example embodiment.
DETAILED DESCRIPTION
A “resource” includes a user, content, a processing device, a node, a service, an application, a system, a directory, a data store, groups of users, combinations of these things, etc. Resources can interact with each other and can either act on other resource or be acted upon by other resources. The term “service” and “application” may be used interchangeably herein and refer to a type of software resource that includes instructions, which when executed by a machine performs operations that change the state of the machine and that may produce output.
A resource is recognized via an “identity.” An identity is authenticated via various techniques (e.g., challenge and response interaction, cookies, assertions, etc.) that use various identifying information (e.g., identifiers with passwords, biometric data, hardware specific data, digital certificates, digital signatures, etc.). A “true identity” is one that is unique to a resource across any context that the resource may engage in over a network (e.g., Internet, Intranet, etc.). However, each resource may have and manage a variety of identities, where each of these identities may only be unique within a given context (given service interaction, given processing environment, given virtual processing environment, etc.).
The phrases “managed resource,” “managed service,” and “managed system” may be used interchangeably and synonymously herein and below. These are special resources that are managed and monitored by a network administrator. These can include such things as servers, proxies, storage devices, email services, etc. The resources that are managed are dispersed over a network, such as the Internet and/or an enterprise Intranet, etc.
As will be explained in greater detail herein and below, the managed resources are dynamic such that they change and evolve in real time as conditions change with them on the network. In a sense, the resources self-populate dynamically defined managed resource groups and add and remove themselves from groups as circumstances warrant.
Various embodiments of this invention can be implemented in existing network architectures, security systems, data centers, and/or communication devices. For example, in some embodiments, the techniques presented herein are implemented in whole or in part in the Novell® network, proxy server products, email products, operating system products, data center products, and/or directory services products distributed by Novell®, Inc., of Provo, Utah.
Of course, the embodiments of the invention can be implemented in a variety of architectural platforms, operating and server systems, devices, systems, or applications. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects of the invention.
It is within this context, that various embodiments of the invention are now presented with reference to the FIGS. 1-4.
FIG. 1 is a diagram of a method 100 for spontaneous resource management, according to an example embodiment. The method 100 (hereinafter “information collection service”) is implemented as instructions in a machine-accessible and computer-readable storage medium. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in FIG. 1. The information collection service is also operational over and processes within a network. The network may be wired, wireless, or a combination of wired and wireless.
At 110, the information collection service regularly receives broadcast messages from managed services or an enterprise over the network.
The broadcast messages can include a variety of information, such as standards being used with the managed services (Distributed Management Task Force (DMTF), Common Information Manager Object Model (CIMOM), Simple Network Management Protocol (SNMP), etc.).
The broadcast messages can also indicate who the managed services are and what they are doing. For example, I am IA32 Intel® 586 server that is loaded with openSUSE® 10.3 and I am running Apache 2.1.2 on ports 80 and 443.
According to an embodiment, at 111, the information collection service receives the broadcast messages as part of a heartbeat message from servers that process the managed services. In other words, in a highly-available enterprise configuration, the servers may periodically broadcast heartbeat messages indicating that they are up and running to the other remaining servers. In this case, the broadcast messages can be part of that heartbeat message.
The information collection service collects the broadcast messages. In some cases, all the information that is advertised by the managed services is contained in the broadcast messages. In another case, at 112, the information collection service periodically performs queries against the managed services and/or their processing environments to acquire additional information for each of the managed services. This additional information is also indexed within the repository with the broadcast messages (discussed below) and made available to the searches of a management tool (also discussed below).
Continuing with the embodiment of 112 and at 113, the information collection service can be configured to inspect install logs and comments located in headers and source code associated with each of the managed services when the queries are performed. So, the information collection service targets specific files, directories, and/or metadata within the processing environments of the managed services to collect the additional information.
In some cases, an entire file, document and/or comments from the processing environment or managed service are grabbed by the information collection service and no real query is performed at all; rather, the whole text version of these entities are used as the additional information. So, free-form text as inputted by personnel associated with the managed services can be captured in its unadulterated format, such as a note from an administrative person that the person made to himself or herself, install read me files, etc.
The information captured by the information collection service can be viewed as similar to a blog or social networking site, but the information is related to a managed resource and not a person (as would be the case with a blog or social networking site). The information is not modified and is retained by the information collection service.
At 120, the information collection service indexes the broadcast messages in a repository that is managed by the information collection service.
In an embodiment, at 121, the information collection service uses a World-Wide Web (WWW) search engine, such as Google®, for performing the indexing within the repository. A management tool (discussed below) subsequently uses the search engine to perform a search of the repository (also discussed below).
In an embodiment, at 122, the information collection service maintains the repository as one or more of the following: a file, a set of files, a directory, a set of directories, a relational database, a set of relational databases organized as a data warehouse, a dynamically maintained document, a set of dynamically maintained documents, an object, a set of objects, an object-oriented database, a set of object-oriented databases, and/or one or more hybrid databases.
At 130, the information collection service subsequently permits a management tool to search the repository for purposes of selectively identifying particular ones of the managed services to form a managed group of services that the management tool dynamically manages. In other words, the management tool searches the repository that this provided and managed by the information collection service to identify particular managed resources. These managed resources are organized as a self-managed group and presented as a logical entity within the management tool for the management tool to monitor and manage. The search can be custom defined, predefined, previously saved, ad hoc, etc.
It is noted that members (services) of the managed group can dynamically change, such that new members are added and/or existing members are deleted from the managed group. This can occur via periodically executing the search. In another case, the search is registered with the information collection service and when the information collection service detects an addition or deletion the management tool is automatically notified via a change in the membership of the managed group. So, members can chaotically change within the managed group.
In an embodiment, at 131, the information collection service also returns a relevancy rating for each particular managed service. This is done when the management tool performs the search against the repository. The management tool can then selectively pick each member of the managed group in response to the relevancy rating. For example, consider a search of the repository that uses Google®, a percentage for relevancy can be automatically provided. Policies can also be used such that when a relevancy rating exceeds a threshold value (e.g., 80%) the managed service associated with the result is automatically added to the managed group.
So, the search can result in automatic managed group population or can result in a semi or partially populated group that can be completely populated by an administrator that interacts with the management tool and views the results from the search. The information that is stored in the repository is associated with particular managed services. The answer set returned with the search can include links to the full content associated with a match in its native location on a particular managed service or in a copy of the full content maintained within the repository.
It is now appreciated how information regarding managed services is collected much like a social networking blog. This information is indexed and made searchable so that network administrators via a management tool can dynamically create on-the-fly and in real-time managed groupings for selective ones of the managed services. As conditions for services change so may their membership within a managed group, these changed conditions can be automatically and dynamically detected in real time, such that the managed groupings are ever evolving. This is a substantial improvement over the traditional static nature of managed groups that network administrators are relegated to managing with conventional tools.
FIG. 2 is a diagram of another method 200 for spontaneous resource management, according to an example embodiment. The method 200 (hereinafter “resource manager” is implemented in a machine-accessible and readable medium as instructions. The instructions when executed by a machine perform the processing depicted in the FIG. 2. Moreover, the resource manager is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
The resource manager presents a perspective of dynamic resource management from an administrator's client device whereas the information collection service (represented by the method 100 of the FIG. 1) presented the perspective of a repository that dynamically collects information about managed resources. So, the resource manager interacts with the information collection service to dynamically define and manage resources.
At 210, the resource manager receives search criteria (custom, ad hoc, previously saved, etc.). The search criteria define a dynamic group of services that are to assemble or to be assembled and managed/monitored on the network.
According to an embodiment, at 211, the resource manager receives the search criteria as free form text that is entered into a search bar of a management tool interface by a network administrator. In this embodiment, the resource manager is the management tool and provides the search bar or menu option to the network administrator. In another case, the search criteria can be entered as a Structured Query Language (SQL) format by the network administrator.
In another case, at 212, the resource manager permits a network administrator to browse an index of information associated with network services for purposes of interactively defining the search criteria.
In another situation, at 213, the resource manager acquires a hierarchy of information from a self-organizing server. The hierarchy is presented to the network administrator and the network administrator can navigate and interact with the hierarchy for purposes of defining the search criteria. So, different views of the information about the networked services can be maintained at the self-organizing server and the network administrator can navigate and view that information via categories, topics, classifications, etc.
At 220, the resource manager submits the search criteria to a self-organizing server over the network. Example processing associated with the self-organizing server was presented above with reference to the method 100 of the FIG. 1.
At 230, the resource manager forms the dynamic group in response to an answer set that is returned from the self-organizing server that identifies each service as conforming to the search criteria. That is, the search defining the search criteria when executed by the self-organizing server reveals an answer set. That answer set includes the identities of particular managed services and those particular managed services form the dynamic group that is to be managed over the network.
According to an embodiment, at 240, the resource manager periodically re-submits the search criteria to the self-organizing server to dynamically update members of the dynamic group. A policy may indicate how frequently the search is re-submitted. Alternatively, when a member of the managed group broadcast is different or has changed information, this can be compared to the search criteria (via the self-organizing server) and the dynamic group of services automatically updated as needed.
Continuing with the embodiment at 240 and at 241, the resource manager dynamically removes at least one service from the dynamic group in response to an updated answer set received from the self-organizing server. The updated answer set excludes that particular service such that when compared to the previous answer set it is noted that the particular service is being dynamically removed.
Also continuing with the embodiment at 240 and at 242, the resource manager dynamically adds at least one new service from the dynamic group of services in response to an updated answer set received from the self-organizing server. Again, the updated answer set reveals an addition of the particular service when compared to the previous answer set.
The dynamic group is updated as conditions change on the network. So, should a particular service change its processing environment or configuration such that it is now not considered a member of the managed group in view of the defined search criteria, then the particular service is automatically and dynamically removed from the managed group.
Consider the following example illustrations of how the resource manager and the self-organizing server (method 100 of FIG. 1) can be used in a few scenarios. A network administrator interacts with the resource manager to define some search criteria that is provided to the self-organizing server. The search criteria define a new group or relationship between some managed servers/services. The group is not a static one time effort, rather the group is an ongoing and dynamic grouping of servers or services that match the criteria, such that servers or services are regularly added or dropped from the group in real time and on-the-fly (as the changes occur within the network).
So, suppose an administrator wants all servers that have Oracle® databases having less than 10% disk space remaining for use. The administrator provides search criteria to this effect and provides it to the self-organizing server and the group is self populated and automatically defined.
In another case, suppose that a managing administrator does not know which applications are susceptible to a given performance bottleneck, but the installing administrator does know. Here, the installing administrator made a note in the install log for the application, which was then reported to the self-organizing server. The managing administrator then does an unstructured query via the self-organizing server to find out any negative consequences to servers that the managing administrator does not even know about should the managing administrator notice a particular performance problem developing in his/her area of assignment.
Suppose further that an administrator wants all servers that have Apache® or IIS and that are not configured with a firewall. The administrator points this query at the self-organizing server and watches to see if any servers pop up that meet the criteria and then he/she can take the appropriate management action.
In still another case, suppose an administrator is trained in samba configuration. He/She is an expert at samba configuration to make it perform at its maximum given memory and processing power. He/She creates a group of all samba servers that have a high load. Any server that pops up in that group he/she can go to and proactively look at for purposes of improving its configuration or making himself/herself known to the local administrator for that server.
In fact, there are many more cases like this, and in each case, it is queries that can be made by simply browsing the self-organizing server for interesting items. This is similar to what individuals might do on Facebook® when looking for interesting new users and or combinations of users. There is no predefined knowledge that is needed at the self-organizing server or in some “uber-admin” that knows and understands all things. Management tools (resource managers) are used to browse the index of or search the self-organizing server so as to see who is up and what is going on and to dynamically create and organize groups of servers/services based on current conditions, rather than based on some predefined and hardcoded structure in a management tool.
FIG. 3 is a diagram of spontaneous resource management system 300, according to an example embodiment. The spontaneous resource management system 300 is implemented in a machine-accessible and computer-readable storage medium as instructions. The instructions when executed by a machine (computer or processor-enabled device) perform the processing depicted in the FIGS. 1 and 2. Moreover, the spontaneous resource management system 300 is operational over a network, and the network may be wired, wireless, or a combination of wired and wireless.
The spontaneous resource management system 300 includes a self-organizing server 301 and a management tool 302. Each of these and their interactions with one another will now be discussed in turn.
The self-organizing server 301 is implemented in a computer-readable storage medium as instructions that process on server machine (computer or processor-enabled device). Example processing associated with the self-organizing server 301 was presented above with reference to the method 100 of the FIG. 1.
The self-organizing server 301 collects information, which is associated with managed services or systems of an enterprise.
According to an embodiment, the self-organizing server 301 passively receives broadcast messages having the information. The broadcast messages are broadcast by each of the managed services over the network.
In another case, the self-organizing server 301 actively scrapes metadata from the managed services to gather some of the information.
The self-organizing server 301 indexes the information in a repository. Also, the self-organizing server 301 permits the management tool 302 to use a WWW search engine to formulate and execute the search.
The management tool 302 is implemented in a computer-readable storage medium as instructions that process on a client machine (computer or processor-enabled device) of a network administrator. Example processing associated with the management tool 302 was presented in detail above with reference to the method 200 of the FIG. 2.
The management tool 302 is used to search the information housed at the self-organizing server 301 for purposes of dynamically and selectively populating a managed group of the managed services or systems.
In an embodiment, the management tool 302 presents an interactive interface to a network administrator for purposes of defining the search and to select and define the managed group. The management tool 302 may permit a search to be defined or permit the search to be automatically built via browsing an index or hierarchy of information related to the managed services and maintained by the self-organizing server 301.
FIG. 4 is a diagram of another spontaneous resource management system 400 according to an example embodiment. The spontaneous resource management system 400 is implemented as instructions on or within a machine-accessible and computer-readable storage medium. The instructions when executed by one or more machines (computer(s) or processor-enabled device(s)) perform various aspects of the processing depicted with respect to the methods 100 and 200 of the FIGS. 1 and 2, respectively; and the system 300 of the FIG. 3. The spontaneous resource management system 400 is also operational over a network and the network may be wired, wireless, or a combination of wired and wireless.
The spontaneous resource management system 400 includes a collection of managed resources 401 and a repository 402. Each of these components and their interactions with one another will now be discussed in turn.
Each resource of the collection of managed resources 401 is implemented in a computer-readable storage medium as instructions and is to be processed by a machine (computer or processor-enabled device) over the network. Example aspects of the collection of managed resources 401 were presented above in detail with reference to the methods 100 and 200 of the FIGS. 1 and 2, respectively, and with respect to the system 300 of the FIG. 3.
The collection of managed resources 401 is dynamically defined via a search that is formulated via a management tool, such as the management tool 302 of the system 300 and depicted in FIG. 3.
In an embodiment, the collection of managed resources 401 is dynamically modified by deleting a member or by adding a new member when conditions related to the search warrant modification to the collection of managed resources 401. In other words, when a member changes information such that it no longer conforms to the search that defines the collection of managed resources 401, then the collection of managed resources 401 is dynamically and in real time modified to remove that particular member. Similarly, the collection of managed resources 401 can be dynamically modified by adding a new member that adds information that conforms to the search.
The repository 402 is implemented in a computer-readable storage medium and is accessible to the managed resources and to other resources of the network. Some example aspects of the repository 402 were presented in detail above with reference to the methods 100 and 200 of the FIGS. 1 and 2, respectively, and with respect to the system 300 of the FIG. 3.
In an embodiment, reach of the managed resources publish or advertise information that is captured in the repository. The search matches the information in the repository. In some instances, the information is at least partially dynamically culled from each of the managed resources.
Also, the information for each of the managed resources is indexed within the repository and compared against search criteria when the search is executed.
The above description is illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of embodiments should therefore be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
The Abstract is provided to comply with 37 C.F.R. §1.72(b) and will allow the reader to quickly ascertain the nature and gist of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
In the foregoing description of the embodiments, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting that the claimed embodiments have more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Description of the Embodiments, with each claim standing on its own as a separate exemplary embodiment.

Claims (7)

The invention claimed is:
1. A machine-implemented method, comprising:
regularly receiving broadcast messages from managed services of an enterprise over a network;
indexing the broadcast messages in a repository; without changing the broadcast messages and each broadcast message indicating the standards to which it adheres and indicating what each managed service associated with a particular broadcast message is doing and what it is, what the each managed service is doing is indicated by what is loaded and processing on a particular device for that managed service; and
subsequently permitting additional information obtained for each managed service to be viewed as a blog, the additional information is related to each managed service and the additional information for selectively identifying particular ones of the managed service that form a managed group of services that a management tool dynamically manages as a logical entity, the managed services are one or more of: services, servers, proxies, and storage devices, and the additional information obtained by periodic searches of a repository that is a self-organizing server, the periodic searches dynamically alters membership in the managed group by adding new managed service and removing existing managed services permitting the membership to chaotically change based on dynamic conditions that change with each of the managed services and the membership is automatically updated when the dynamic conditions are evaluated and warrant addition or removal from the membership, each service dynamically self-populates itself to the particular groups and each of the service dynamically self adds and removes itself from the particular groups as circumstances warrant based on the evaluation of the conditions.
2. The method of claim 1, wherein regularly receiving further includes receiving the broadcast messages as part of heartbeat messages emanating from servers that process the managed services.
3. The method of claim 1, wherein regularly receiving further includes periodically performing queries against the managed services to acquire additional information for each of the managed services that is indexed within the repository with the broadcast messages and available to the search of the management tool.
4. The method of claim 3, wherein performing further includes inspecting install logs and comments located in headers and source code for the managed services when performing the queries.
5. The method of claim 1, wherein indexing further includes using a World-Wide Web (WWW) search engine to perform the indexing of the broadcast messages within the repository and wherein the management tool uses the search engine to subsequently perform the search.
6. The method of claim 1, wherein indexing further includes maintaining the repository as one or more of: a file, a set of files, a directory, a set of directories, a relational database, a set of relational databases organized as a data warehouse, a dynamically maintained document, a set of dynamically maintained documents, an object, a set of objects, an object oriented database, a set of object oriented databases, and a hybrid database.
7. The method of claim 1, wherein subsequently permitting further includes returning a relevancy rating for each particular managed service that is returned when the management tool performs the search against the repository, and wherein the management tool selectively picks each member of the managed group in response to that member's relevancy rating.
US12/258,181 2008-10-24 2008-10-24 Spontaneous resource management Expired - Fee Related US8914481B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/258,181 US8914481B2 (en) 2008-10-24 2008-10-24 Spontaneous resource management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/258,181 US8914481B2 (en) 2008-10-24 2008-10-24 Spontaneous resource management

Publications (2)

Publication Number Publication Date
US20100106834A1 US20100106834A1 (en) 2010-04-29
US8914481B2 true US8914481B2 (en) 2014-12-16

Family

ID=42118556

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/258,181 Expired - Fee Related US8914481B2 (en) 2008-10-24 2008-10-24 Spontaneous resource management

Country Status (1)

Country Link
US (1) US8914481B2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8988708B2 (en) 2010-08-18 2015-03-24 Samsung Electronics Co., Ltd. Host device to monitor status of image forming apparatus and control method thereof
US10725831B2 (en) 2014-10-08 2020-07-28 Hewlett Packard Enterprise Development Lp Resource federation

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5857195A (en) 1990-08-31 1999-01-05 Fujitsu Limited Method of developing and modifying self-describing database management system to generate a new database management system from an existing database management system
US20020184357A1 (en) * 2001-01-22 2002-12-05 Traversat Bernard A. Rendezvous for locating peer-to-peer resources
US20030023712A1 (en) * 2001-03-30 2003-01-30 Zhao Ling Z. Site monitor
US6625643B1 (en) * 1998-11-13 2003-09-23 Akamai Technologies, Inc. System and method for resource management on a data network
US20040111315A1 (en) * 2002-10-16 2004-06-10 Xerox Corporation Device model agent
US20050015471A1 (en) * 2003-07-18 2005-01-20 Zhang Pu Paul Secure cluster configuration data set transfer protocol
US20050050225A1 (en) * 2003-08-29 2005-03-03 Tatman Lance A. System and method for discovery of BGP router topology
US20050289110A1 (en) * 2004-06-25 2005-12-29 Dominic Giampaolo Trusted index structure in a network environment
US6990440B1 (en) 2000-08-16 2006-01-24 Alexander Sroka Self-organizing and automatically cross-referencing information management system
US20060041660A1 (en) * 2000-02-28 2006-02-23 Microsoft Corporation Enterprise management system
US20060246879A1 (en) * 2005-04-29 2006-11-02 Microsoft Corporation Dynamic utilization of condensing metadata
US20070088814A1 (en) * 2005-10-18 2007-04-19 Canon Kabushiki Kaisha Network management server, control method, computer program, computer readable storage medium, and network system
US20070214097A1 (en) * 2006-02-28 2007-09-13 Todd Parsons Social analytics system and method for analyzing conversations in social media
US20080013566A1 (en) 2006-07-05 2008-01-17 Smith David M Self-organized and self-managed ad hoc communications network
US20080056269A1 (en) * 2006-09-05 2008-03-06 Motorola, Inc. Methods and devices for standalone social networking and internet protocol communication setup
US20080083031A1 (en) * 2006-12-20 2008-04-03 Microsoft Corporation Secure service computation
US20080133747A1 (en) 2006-11-21 2008-06-05 Fish Russell H System to self organize and manage computer users
US20080147487A1 (en) * 2006-10-06 2008-06-19 Technorati Inc. Methods and apparatus for conversational advertising
US7433945B2 (en) 2002-04-24 2008-10-07 International Business Machines Corporation Dynamic configuration and self-tuning of inter-nodal communication resources in a database management system
US20110022602A1 (en) * 2007-08-17 2011-01-27 Google Inc. Ranking Social Network Objects
US7886033B2 (en) * 2004-12-07 2011-02-08 Cisco Technology, Inc. Network administration tool employing a network administration protocol

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5857195A (en) 1990-08-31 1999-01-05 Fujitsu Limited Method of developing and modifying self-describing database management system to generate a new database management system from an existing database management system
US6625643B1 (en) * 1998-11-13 2003-09-23 Akamai Technologies, Inc. System and method for resource management on a data network
US20060041660A1 (en) * 2000-02-28 2006-02-23 Microsoft Corporation Enterprise management system
US6990440B1 (en) 2000-08-16 2006-01-24 Alexander Sroka Self-organizing and automatically cross-referencing information management system
US20020184357A1 (en) * 2001-01-22 2002-12-05 Traversat Bernard A. Rendezvous for locating peer-to-peer resources
US20030023712A1 (en) * 2001-03-30 2003-01-30 Zhao Ling Z. Site monitor
US7433945B2 (en) 2002-04-24 2008-10-07 International Business Machines Corporation Dynamic configuration and self-tuning of inter-nodal communication resources in a database management system
US20040111315A1 (en) * 2002-10-16 2004-06-10 Xerox Corporation Device model agent
US20050015471A1 (en) * 2003-07-18 2005-01-20 Zhang Pu Paul Secure cluster configuration data set transfer protocol
US20050050225A1 (en) * 2003-08-29 2005-03-03 Tatman Lance A. System and method for discovery of BGP router topology
US20050289110A1 (en) * 2004-06-25 2005-12-29 Dominic Giampaolo Trusted index structure in a network environment
US7886033B2 (en) * 2004-12-07 2011-02-08 Cisco Technology, Inc. Network administration tool employing a network administration protocol
US20060246879A1 (en) * 2005-04-29 2006-11-02 Microsoft Corporation Dynamic utilization of condensing metadata
US20070088814A1 (en) * 2005-10-18 2007-04-19 Canon Kabushiki Kaisha Network management server, control method, computer program, computer readable storage medium, and network system
US20070214097A1 (en) * 2006-02-28 2007-09-13 Todd Parsons Social analytics system and method for analyzing conversations in social media
US20080013566A1 (en) 2006-07-05 2008-01-17 Smith David M Self-organized and self-managed ad hoc communications network
US20080056269A1 (en) * 2006-09-05 2008-03-06 Motorola, Inc. Methods and devices for standalone social networking and internet protocol communication setup
US20080147487A1 (en) * 2006-10-06 2008-06-19 Technorati Inc. Methods and apparatus for conversational advertising
US20080133747A1 (en) 2006-11-21 2008-06-05 Fish Russell H System to self organize and manage computer users
US20080083031A1 (en) * 2006-12-20 2008-04-03 Microsoft Corporation Secure service computation
US20110022602A1 (en) * 2007-08-17 2011-01-27 Google Inc. Ranking Social Network Objects

Also Published As

Publication number Publication date
US20100106834A1 (en) 2010-04-29

Similar Documents

Publication Publication Date Title
US11637762B2 (en) MDL-based clustering for dependency mapping
US10938845B2 (en) Detection of user behavior deviation from defined user groups
US20200007561A1 (en) Interactive geographic representation of network security threats
US7904456B2 (en) Security monitoring tool for computer network
US20190182101A1 (en) Log file processing for root cause analysis of a network fabric
US20030131093A1 (en) System for generating usage data in a distributed information processing environment and method therefor
US8640251B1 (en) Methods and systems for classifying computer documents into confidential levels using log information
US8898272B1 (en) Identifying information in resource locators
US20080263009A1 (en) System and method for sharing of search query information across organizational boundaries
US10404731B2 (en) Method and device for detecting website attack
US11503063B2 (en) Systems and methods for detecting hidden vulnerabilities in enterprise networks
EP4205357A1 (en) Api key security posture scoring for microservices to determine microservice security risks
US8914481B2 (en) Spontaneous resource management
US11627166B2 (en) Scope discovery and policy generation in an enterprise network
US20210392165A1 (en) Application protectability schemes for enterprise applications
US11895156B2 (en) Securing network resources from known threats
US11765046B1 (en) Endpoint cluster assignment and query generation
Mokhov et al. Automating MAC spoofer evidence gathering and encoding for investigations
US11915044B2 (en) Distributed task assignment in a cluster computing system
Drakopoulos et al. Performance study of client-server storage systems
Stoddard et al. Tanium reveal: a federated search engine for querying unstructured file data on large enterprise networks
Jash et al. A hierarchical approach to extract application logs with visualization in a containerized environment
Zohuri et al. Business Resilience System Topology of Hardware and Software
Patt Methodologies for experimental research in computer architecture and performance measurement

Legal Events

Date Code Title Description
AS Assignment

Owner name: NOVELL, INC.,UTAH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISAACSON, SCOTT ALAN;CARTER, STEPHEN R;GREEN, TAMMY ANITA;SIGNING DATES FROM 20081021 TO 20081024;REEL/FRAME:021909/0548

Owner name: NOVELL, INC., UTAH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISAACSON, SCOTT ALAN;CARTER, STEPHEN R;GREEN, TAMMY ANITA;SIGNING DATES FROM 20081021 TO 20081024;REEL/FRAME:021909/0548

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: GRANT OF PATENT SECURITY INTEREST;ASSIGNOR:NOVELL, INC.;REEL/FRAME:026270/0001

Effective date: 20110427

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: GRANT OF PATENT SECURITY INTEREST (SECOND LIEN);ASSIGNOR:NOVELL, INC.;REEL/FRAME:026275/0018

Effective date: 20110427

AS Assignment

Owner name: NOVELL, INC., UTAH

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS FIRST LIEN (RELEASES RF 026270/0001 AND 027289/0727);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0077

Effective date: 20120522

Owner name: NOVELL, INC., UTAH

Free format text: RELEASE OF SECURITY IN PATENTS SECOND LIEN (RELEASES RF 026275/0018 AND 027290/0983);ASSIGNOR:CREDIT SUISSE AG, AS COLLATERAL AGENT;REEL/FRAME:028252/0154

Effective date: 20120522

AS Assignment

Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK

Free format text: GRANT OF PATENT SECURITY INTEREST SECOND LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0316

Effective date: 20120522

Owner name: CREDIT SUISSE AG, AS COLLATERAL AGENT, NEW YORK

Free format text: GRANT OF PATENT SECURITY INTEREST FIRST LIEN;ASSIGNOR:NOVELL, INC.;REEL/FRAME:028252/0216

Effective date: 20120522

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: NOVELL, INC., UTAH

Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0316;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034469/0057

Effective date: 20141120

Owner name: NOVELL, INC., UTAH

Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 028252/0216;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:034470/0680

Effective date: 20141120

CC Certificate of correction
AS Assignment

Owner name: BANK OF AMERICA, N.A., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:MICRO FOCUS (US), INC.;BORLAND SOFTWARE CORPORATION;ATTACHMATE CORPORATION;AND OTHERS;REEL/FRAME:035656/0251

Effective date: 20141120

AS Assignment

Owner name: MICRO FOCUS SOFTWARE INC., DELAWARE

Free format text: CHANGE OF NAME;ASSIGNOR:NOVELL, INC.;REEL/FRAME:040020/0703

Effective date: 20160718

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW

Free format text: NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:042388/0386

Effective date: 20170501

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., DELAWARE

Free format text: SECURITY INTEREST;ASSIGNORS:ATTACHMATE CORPORATION;BORLAND SOFTWARE CORPORATION;NETIQ CORPORATION;AND OTHERS;REEL/FRAME:044183/0718

Effective date: 20170901

AS Assignment

Owner name: JPMORGAN CHASE BANK, N.A., AS SUCCESSOR AGENT, NEW

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE TO CORRECT TYPO IN APPLICATION NUMBER 10708121 WHICH SHOULD BE 10708021 PREVIOUSLY RECORDED ON REEL 042388 FRAME 0386. ASSIGNOR(S) HEREBY CONFIRMS THE NOTICE OF SUCCESSION OF AGENCY;ASSIGNOR:BANK OF AMERICA, N.A., AS PRIOR AGENT;REEL/FRAME:048793/0832

Effective date: 20170501

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.)

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20181216

AS Assignment

Owner name: NETIQ CORPORATION, WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: ATTACHMATE CORPORATION, WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: SERENA SOFTWARE, INC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: MICRO FOCUS (US), INC., MARYLAND

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: MICRO FOCUS LLC (F/K/A ENTIT SOFTWARE LLC), CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 044183/0718;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062746/0399

Effective date: 20230131

Owner name: MICRO FOCUS SOFTWARE INC. (F/K/A NOVELL, INC.), WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009

Effective date: 20230131

Owner name: MICRO FOCUS (US), INC., MARYLAND

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009

Effective date: 20230131

Owner name: NETIQ CORPORATION, WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009

Effective date: 20230131

Owner name: ATTACHMATE CORPORATION, WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009

Effective date: 20230131

Owner name: BORLAND SOFTWARE CORPORATION, MARYLAND

Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME 035656/0251;ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:062623/0009

Effective date: 20230131